-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tag signatures seem to be broken #1065
Comments
@tianon any idea? |
The process described in docker-library/official-images#1516 is still accurate (in other words, we don't have any involvement or insight into the signing process); I'll poke internally at Docker and see if someone can take a look at what's up. 😞 |
Just for the record, it appears that similar problems happened before: docker-library/official-images#5874 |
@tianon Any luck with the poking? |
docker-library/official-images#5874 (comment) was the (successful) result of my last round of poking. |
Still facing the issue, so we decided to pull via the image digest, gotten from here @tianon am i right to say this should be as safe as using DCT, but just that we have to be more involved in our node upgrade process compared to using docker tags? bash-3.2$ export DOCKER_CONTENT_TRUST=1
bash-3.2$ docker pull node:12.9.0-alpine
No valid trust data for 12.9.0-alpine
bash-3.2$ docker pull node@sha256:b1a32805dbe3894722db93b7f1a3489a208ddf4e9b9341d1e8d3e366fcc0998d
sha256:b1a32805dbe3894722db93b7f1a3489a208ddf4e9b9341d1e8d3e366fcc0998d: Pulling from library/node
Digest: sha256:b1a32805dbe3894722db93b7f1a3489a208ddf4e9b9341d1e8d3e366fcc0998d
Status: Image is up to date for node@sha256:b1a32805dbe3894722db93b7f1a3489a208ddf4e9b9341d1e8d3e366fcc0998d
docker.io/library/node@sha256:b1a32805dbe3894722db93b7f1a3489a208ddf4e9b9341d1e8d3e366fcc0998d |
I don't believe notary is consulted at all when you pull by digest, but I'd generally recommend pulling by digest anyhow if you want to make sure you're getting the exact bits you expect to be (especially over time). |
@dyihoon90 My understanding is that DCT bind tags to digests, so you can be sure that pulling a tag gives you a legitimate image. And if you pull directly by the digest then the end result is the same, but the process is less convenient. (Of course it also depends on the proper implementation of digest verification in the Docker client--if that part is broken then I guess there can be no guarantees at all.) |
Anyone looking into this at the moment? Since we rely on trusted images this is quite a big deal... |
I encounter the same issue, no content trust for images other than the latest. Any idea? |
Unfortunately this is still docker-library/official-images#6838, and there's not anything we can do about it without Docker's help. 😞 |
Thanks @tianon for reaching out, yeah I read the link yesterday. I tried to file an issue in docker forum, I hope it will get attention there. https://forums.docker.com/t/dct-enabled-on-node-official-images-return-no-valid-trust-data/99197 |
@nschonni thanks for looking at the issue I opened. What I don't understand is that while the signature for the How can I validate the contents of |
It seems that something is wrong with signing base Node images' tags on Docker Hub:
As you can see the signed
node:latest
tag is outdated while the unsigned one is recent (and matchesnode:12.6.0
).(By the way, there seem to be two digests for the same image, hopefully that's fine?)
Also, it appears that the recent images have no signed counterparts:
But images pushed roughly 5 months ago are still signed:
The text was updated successfully, but these errors were encountered: